Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
General
-
Target
tmp.exe
-
Size
308KB
-
MD5
c60f5fa3a579bca2c8c377f7e15b2221
-
SHA1
d44b5c6dd64284f00d6f9d05cf5327a91cad9339
-
SHA256
f5913e753281dbdf88f36c73d13afbf4af62046e25f8e148e87a80e88818c4d7
-
SHA512
f419adf4bd07ce18d9b7de7445b2d0185653de27738fd4403f880ee11bf49ca8a1958c1b2c94f8f4c5da52ebc79462cfb6fe71849439f6af017a95b44af2f77b
-
SSDEEP
6144:DVa+NrJiVBc2wc6oKXwdUWFQg1SGWEWAMiY7ivtaqgntTZXHAYq7:J1NrJaBcOOiHWEWAMFKtdstTfq
Malware Config
Extracted
lumma
https://bordersoarmanusjuw.shop/api
https://entitlementappwo.shop/api
https://economicscreateojsu.shop/api
https://pushjellysingeywus.shop/api
https://absentconvicsjawun.shop/api
https://suitcaseacanehalk.shop/api
https://mealplayerpreceodsju.shop/api
https://wifeplasterbakewis.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 2888 set thread context of 1716 2888 tmp.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
tmp.exedescription pid process target process PID 2888 wrote to memory of 1428 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1428 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1428 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe PID 2888 wrote to memory of 1716 2888 tmp.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1428
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1716